Analysis
-
max time kernel
154s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 20:26
Static task
static1
Behavioral task
behavioral1
Sample
44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe
Resource
win10v2004-20220812-en
General
-
Target
44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe
-
Size
887KB
-
MD5
6c5e2996e2241d84f6b4b423190dcc9a
-
SHA1
f5ab483cd9f743a368ae12c1b2d4d669ac6263fb
-
SHA256
44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a
-
SHA512
297b37414b6c3fca77c8209cfb285d364078bc4c1f98f5779c72379ee0c5ec2cf3f6f501d787d72145464ef3917744229bc41eb210252ab2e732c8d2a4bfd9c0
-
SSDEEP
12288:rjS3Yvyn/0TvhifHW8NUnVuCjNHtJsqb6y0q5LD:ru3Y578NUnV9jNHf1Wm
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe -
Executes dropped EXE 1 IoCs
pid Process 5116 42410.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\smrss.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File created C:\WINDOWS\SysWOW64\freizer.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\servertool.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmiregistry.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ssvagent.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\joticon.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\klist.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\keytool.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmid.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jjs.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java-rmi.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 5116 42410.exe Token: SeTcbPrivilege 5116 42410.exe Token: SeSecurityPrivilege 5116 42410.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 456 wrote to memory of 4280 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 81 PID 456 wrote to memory of 4280 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 81 PID 456 wrote to memory of 4280 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 81 PID 456 wrote to memory of 4952 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 82 PID 456 wrote to memory of 4952 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 82 PID 456 wrote to memory of 4952 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 82 PID 4952 wrote to memory of 1060 4952 cmd.exe 85 PID 4952 wrote to memory of 1060 4952 cmd.exe 85 PID 4952 wrote to memory of 1060 4952 cmd.exe 85 PID 4280 wrote to memory of 380 4280 cmd.exe 86 PID 4280 wrote to memory of 380 4280 cmd.exe 86 PID 4280 wrote to memory of 380 4280 cmd.exe 86 PID 456 wrote to memory of 5116 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 87 PID 456 wrote to memory of 5116 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 87 PID 456 wrote to memory of 5116 456 44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe"C:\Users\Admin\AppData\Local\Temp\44a19b000695b25bf74a0d1a627960e390411d8f48d17634299fb718ac24334a.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:380
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:1060
-
-
-
C:\windows\temp\42410.exe"C:\windows\temp\42410.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD54844fd851088a11e240cfe5b54096209
SHA13a25e5d4c11922195a716e4eb86f5f3e961f01ed
SHA25657c4a326be03a5ddd4d409b21ec6a5372777618b6eec4112029114a0de8bb824
SHA512c102fad40b730183d2d382c220c2b457bba8e84bcf07926a17ec16b736e2b74fad05f936bc3b3aa34e16e1a86f54125d70cce0b54fe3e69c8b99c8f54be21831
-
Filesize
59KB
MD54844fd851088a11e240cfe5b54096209
SHA13a25e5d4c11922195a716e4eb86f5f3e961f01ed
SHA25657c4a326be03a5ddd4d409b21ec6a5372777618b6eec4112029114a0de8bb824
SHA512c102fad40b730183d2d382c220c2b457bba8e84bcf07926a17ec16b736e2b74fad05f936bc3b3aa34e16e1a86f54125d70cce0b54fe3e69c8b99c8f54be21831